Search Our Site

Hear from

Was needing IT services in my home and they were able to come out the next business day. Was very impressed that they could fix the issue so quickly and efficiently. Very helpful, knowledgeable and courteous as well! Would highly recommend RE2!read more

Hear from

Was needing IT services in my home and they were able to come out the next business day. Was very impressed that they could fix the issue so quickly and efficiently. Very helpful, knowledgeable and courteous as well! Would highly recommend RE2!

Android Defenses Breached On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero. The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked

The Fall of a Crypto Exchanger Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, they are susceptible to abuse and have been many time en-counting. Many news posts and articles lately involve the same old story of hackers

This just in, Cisco, the “worldwide leader in IT and networking” has a severe but, that has been rated a “10 out of 10” by a security researcher. The bug has to do with Cisco’s ASA software (Adaptive security Appliance). This bug is identified as a severe double-free vulnerability that is located in the Secure

Recently a post has surfaced regarding WordPress, the web-hosting site. Apparently it is being attacked by cryptomining code, stealing the information and resources of computers visiting the site. It is believed the Monero cryptocurrency is to blame for the mining. Sucuri, the researchers that noticed the mining, say that while the front end of website

I know you are all tired of seeing the word “hacker” everywhere. But to be honest, i’m certain it will only become more relevant as we move forward. Due to hackers playing such a prominent role in the modern world, our constant efforts to fight hackers and the ransomware and malware they bring forth will

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments under the guise of “for our own good”. However as of late, it seems the government isn’t what we need to worry about when it comes to interference in others’

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years. Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up their computer systems, preventing access to patient information and other necessary medical records. Part of the Greenfield health network became locked down due to ransomware, preventing further medical action for

January 13th, all was right, until a sneaky little hacker came crawling in the night. To steal and plunder, wallets oh wonder, riches they desire watch them set fire. So basically, hackers have stolen crypto wallets from the Stellar Lumen currency. Thus far there has been no claim as to who has stolen the wallets

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt to gain email access, tensions rise in the US governments management of the continual Russian online invasions from hackers abound. This hacking group has been known for its penetration of